Skip to main content
Log in

A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Edge computing server deployed at the edge of the network has promoted the development of the Internet of Things (IoT) but also brings some security problems. Traditional IoT security solutions have not met the requirements of the current rapid growth of equipment, real-time and lightweight. Therefore, the development of new authentication and key agreement is becoming an important means to solve the security problems of the IoT. To address this challenge, we propose an authentication framework for the edge computing-enabled IoT environment. This framework aims to facilitate the establishment of secure communication among devices and between devices and edge servers. This authentication framework achieves secure communication and identity verification among edge computing-enabled IoT devices and between devices and edge servers by incorporating a portion of the local private key during registration and leveraging a distributed blockchain network. Formal and informal security analyses of the proposed protocol show that the protocol effectively responds to numerous security threats while satisfying various security attributes. In addition, the study provides a comprehensive assessment of the computational and transmission overheads associated with the protocol. The results show that the protocol’s commendable performance in terms of both computational efficiency and transmission cost-effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

All data generated or analyzed during this study are included in this published article.

Code availability

Not applicable.

References

  1. Zhang K, Ni J, Yang K, Liang X, Ren J, Shen XS (2017) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55(1):122–129. https://doi.org/10.1109/MCOM.2017.1600267CM

    Article  Google Scholar 

  2. Ren Y, Leng Y, Qi J, Sharma PK, Wang J, Makhadmeh ZA, Tolba A (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Future Gener Comput Syst 115:304–313. https://doi.org/10.1016/j.future.2020.09.019

    Article  Google Scholar 

  3. Li W, Lin K, Chen L, Yang D, Ge Q, Wang Z (2023) Self-powered wireless flexible Ionogel wearable devices. ACS Appl Mater Interfaces 15(11):14768–14776. https://doi.org/10.1021/acsami.2c19744

    Article  CAS  Google Scholar 

  4. Sun Y-N, Qin W, Hu J-H, Xu H-W, Sun PZ (2023) A causal model-inspired automatic feature-selection method for developing data-driven soft sensors in complex industrial processes. Engineering 22:82–93. https://doi.org/10.1016/j.eng.2022.06.019

    Article  Google Scholar 

  5. Li X, Tan J, Liu A, Vijayakumar P, Kumar N, Alazab M (2021) A novel UAV-enabled data collection scheme for intelligent transportation system through UAV speed control. IEEE Trans Intell Transp Syst 22(4):2100–2110. https://doi.org/10.1109/TITS.2020.3040557

    Article  Google Scholar 

  6. Wang Y, Su Z, Guo S, Dai M, Luan TH, Liu Y (2023) A survey on digital twins: Architecture, enabling technologies, security and privacy, and future prospects. IEEE Internet Things J 10(17):14965–14987. https://doi.org/10.1109/JIOT.2023.3263909

    Article  Google Scholar 

  7. Nguyen DDN, Sood K, Xiang Y, Gao L, Chi L, Yu S (2023) Toward IoT node authentication mechanism in next generation networks. IEEE Internet Things J 10(15):13333–13341. https://doi.org/10.1109/JIOT.2023.3262822

    Article  Google Scholar 

  8. Jia X, He D, Kumar N, Choo K-KR (2020) A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst J 14(1):560–571. https://doi.org/10.1109/JSYST.2019.2896064

    Article  ADS  Google Scholar 

  9. Liu Y, Wang J, Yan Z, Wan Z, Jäntti R (2023) A survey on blockchain-based trust management for internet of things. IEEE Internet Things J 10(7):5898–5922. https://doi.org/10.1109/JIOT.2023.3237893

    Article  Google Scholar 

  10. Dai H-N, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076–8094. https://doi.org/10.1109/JIOT.2019.2920987

    Article  Google Scholar 

  11. Shen S, Zhang K, Zhou Y, Ci S (2020) Security in edge-assisted internet of things: challenges and solutions. Sci China Inf Sci 63(12):220302. https://doi.org/10.1007/s11432-019-2906-y

    Article  MathSciNet  Google Scholar 

  12. Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M (2021) A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J 8(6):4004–4022. https://doi.org/10.1109/JIOT.2020.3015432

    Article  Google Scholar 

  13. Ni J, Lin X, Shen XS (2019) Toward edge-assisted internet of things: from security and efficiency perspectives. IEEE Netw 33(2):50–57. https://doi.org/10.1109/MNET.2019.1800229

    Article  Google Scholar 

  14. Tsai J-L, Lo N-W (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805–815. https://doi.org/10.1109/JSYST.2014.2322973

    Article  ADS  Google Scholar 

  15. He D, Kumar N, Khan MK, Wang L, Shen J (2018) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2):1621–1631. https://doi.org/10.1109/JSYST.2016.2633809

    Article  ADS  Google Scholar 

  16. Irshad A, Sher M, Hafiz F, Alzahrani B, Chaudhry S, Kumar R (2016) An improved multi-server authentication scheme for distributed mobile cloud computing services. KSII Trans Internet Inf Syst 10(12):5529–5552. https://doi.org/10.3837/tiis.2016.12.021

    Article  Google Scholar 

  17. Wang J, Wu L, Choo K-KR, He D (2020) Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans Ind Inf 16(3):1984–1992. https://doi.org/10.1109/TII.2019.2936278

    Article  Google Scholar 

  18. Wang W, Huang H, Xue L, Li Q, Malekian R, Zhang Y (2021) Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment. J Syst Architect 115:102024. https://doi.org/10.1016/j.sysarc.2021.102024

    Article  Google Scholar 

  19. Vivekanandan M, Sastry VN, Srinivasulu Reddy U, (2021) BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw Appl 14(1):403–419. https://doi.org/10.1007/s12083-020-00963-w

    Article  Google Scholar 

  20. Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for IoT environment. IEEE Internet Things J 6(6):9762–9773. https://doi.org/10.1109/JIOT.2019.2931372

    Article  Google Scholar 

  21. Das AK, Wazid M, Yannam AR, Rodrigues JJPC, Park Y (2019) Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7:55382–55397. https://doi.org/10.1109/ACCESS.2019.2912998

    Article  Google Scholar 

  22. Lee D-H, Lee I-Y (2020) A lightweight authentication and key agreement schemes for IoT environments. Sensors. https://doi.org/10.3390/s20185350

    Article  PubMed  PubMed Central  Google Scholar 

  23. Andrew J, Isravel DP, Sagayam KM, Bhushan B, Sei Y, Eunice J (2023) Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2023.103633

    Article  Google Scholar 

  24. Bhushan B, Sinha P, Sagayam KM, Andrew J (2021) Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions. Comput Electric Eng 90:106897. https://doi.org/10.1016/j.compeleceng.2020.106897

    Article  Google Scholar 

  25. Cui Z, XUE F, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251. https://doi.org/10.1109/TSC.2020.2964537

    Article  Google Scholar 

  26. Zhaofeng M, Jialin M, Jihui W, Zhiguang S (2021) Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J 8(4):2116–2123. https://doi.org/10.1109/JIOT.2020.3037733

    Article  Google Scholar 

  27. Khashan OA, Khafajah NM (2023) Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. J King Saud Univ Comput Inf Sci 35(2):726–739. https://doi.org/10.1016/j.jksuci.2023.01.011

    Article  Google Scholar 

  28. Liu Y, Liu A, Xia Y, Hu B, Liu J, Wu Q, Tiwari P (2023) A blockchain-based cross-domain authentication management system for IoT devices. IEEE Trans Netw Sci Eng. https://doi.org/10.1109/TNSE.2023.3292624

    Article  Google Scholar 

  29. Li Y, Cheng Q, Liu X, Li X (2021) A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Syst J 15(1):935–946. https://doi.org/10.1109/JSYST.2020.2979006

    Article  ADS  Google Scholar 

  30. Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. Springer, Berlin. https://doi.org/10.1007/978-3-540-40061-5_29

    Book  Google Scholar 

  31. Bellare M, Pointcheval D, Rogaway P (2000). Authenticated key exchange secure against dictionary attacks. Springer, Berlin. https://doi.org/10.1007/3-540-45539-6-11

  32. Jakobsson M, Pointcheval D (2002) Mutual authentication for low-power mobile devices. Springer, Berlin. https://doi.org/10.1007/3-540-46088-8_17

    Book  Google Scholar 

  33. Abdalla M, Fouque P-A, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) Public Key Cryptography - PKC 2005, pp 65–84. Springer, Berlin. https://doi.org/10.1007/978-3-540-30580-4_6

  34. Mishra D, Dharminder D, Yadav P, Rao YS, Vijayakumar P, Kumar N (2020) A provably secure dynamic id-based authenticated key agreement framework for mobile edge computing without a trusted party. J Inf Secur Appl 55:102648. https://doi.org/10.1016/j.jisa.2020.102648

    Article  Google Scholar 

  35. Yahuza M, Idris MYI, Wahab AWA, Nandy T, Ahmedy IB, Ramli R (2021) An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network. IEEE Access 9:31420–31440. https://doi.org/10.1109/ACCESS.2021.3060420

    Article  Google Scholar 

  36. Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. Advances in Cryptology—EUROCRYPT 2002. Springer, Berlin, pp 337–351. https://doi.org/10.1007/3-540-46035-7_22

    Chapter  Google Scholar 

  37. Srinivas J, Das AK, Kumar N, Rodrigues JJPC (2020) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Dependable Secure Comput 17(5):942–956. https://doi.org/10.1109/TDSC.2018.2828306

    Article  Google Scholar 

Download references

Funding

This paper is supported by the Youth Fund Project of Beijing Wuzi University (No. 2023XJQN11).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiqiang Zhang.

Ethics declarations

Confict of interest

The authors declare that they have no confict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, S., Cao, D. A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT. J Supercomput 80, 6778–6808 (2024). https://doi.org/10.1007/s11227-023-05696-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05696-0

Keywords

Navigation